Dell Protected Workspace Owner's manual

Category
Software
Type
Owner's manual

DellProtectedWorkspaceManagementServerv2.2.2
CreatedandMaintainedbyInvincea,Inc.
ProprietaryForCustomerUseOnly
DellProtectedWorkspaceManagementServer
Installationand
ConfigurationGuide
2
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
Contents
PurposeandIntendedAudience......................................................................................................................5
SystemRequirements.....................................................................................................................................5
DPWMSSizingRecommendations............................................................................................................................6
DellProtectedWorkspaceManagementServerFeatures...............................................................................7
ThreatsModule........................................................................................................................................................7
ConfigurationModule..............................................................................................................................................7
AdminModule.........................................................................................................................................................7
InstallationonVMwarevSphere4.xorlater...................................................................................................8
InstallingVMwareToolsforDPWMSrunninginavSphereEnvironment................................................................14
UpgradingthenetworkadaptertoVMXNET3forDPWMSrunninginavSphereEnvironment................................16
ConversionoffilesforVMwareWorkstation7or8................................................................................................21
InstallingDPWMSonVMwareWorkstation7.1.xorlater............................................................................22
InstallingtheDPWMSonCustomHardwareoracustomVirtualMachine....................................................24
InstallingtheDPWMSandprerequisite s.................................................................................................................24
ConfiguringtheDPWMSSYSVstartupscript...........................................................................................................25
ConfiguringtheDPWMSconfigurationfile.............................................................................................................27
[server]........................................................................................................................................................................................27
[license].......................................................................................................................................................................................28
[mysql]........................................................................................................................................................................................28
[logging]......................................................................................................................................................................................28
ApplyingNewUpdatesviatheUI..................................................................................................................29
ManualUpgradefromviaSSH/Console........................................................................................................31
Mergingconfigurationfile(ims.conf)changesafterupgrade.......................................................................32
ConfiguringSecureProtocolforClientConnections.......................................................................................32
ConfiguringtheDellProtectedWorkspaceManagementServerforBasicOperationPreBuiltVirtual
MachineOnly................................................................................................................................................33
ObtainingtheDHCPAddressoftheSystem............................................................................................................33
AccessingtheWebUI..............................................................................................................................................34
Changingthetimeortimezone..............................................................................................................................35
NetworkConfiguration...........................................................................................................................................38
SelfSignedCertificateCreation..............................................................................................................................42
Changingtherootandims_adminpasswords.........................................................................................................45
3
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
AdditionalAdministrativeTasks...................................................................................................................46
ModifyingthedefaultFirewall...............................................................................................................................46
InstallingLinuxUpdates.........................................................................................................................................47
Generatinganewselfsignedcertificateafterinitialconfigurationiscomplete......................................................49
InstallingaTrustedSSLcertificate..........................................................................................................................49
GeneratingaCSR.............................................................................................................................................................................49
ImportingSignedCertificateandKey..............................................................................................................................................51
ConfiguringtheDellProtectedWorkspaceManagementServerforSYSLOG........................................................... 52
TestingSYSLOGconnectionfromDPWMS......................................................................................................................................53
ConfiguringtheThreatsModulewiththeCorrectSYSLOGformat.................................................................................................54
OperationalNotesfortheDellProtectedWorkspaceManagementServer...................................................55
SecurityRestrictions/Features................................................................................................................................55
LoggingintotheApplianceRemotelyviaSSH.........................................................................................................55
ConfiguringDellProtectedWorkspacetoworkwiththeDellProtectedWorkspaceManagementServer
ConfigurationManagementModule.............................................................................................................56
ConfiguringDellProtectedWorkspacetoworkwiththeDellProtectedWorkspaceManagementServer
ThreatDataModule.....................................................................................................................................57
DellProtectedWorkspaceManagementServerAdministrativeTasks..........................................................58
AcquiringthetemporaryadministratorpasswordforDPWMSUI...........................................................................58
LoggingintotheDellProtectedWorkspaceManagementServerConsole ...............................................................59
EnteringtheDPWMSLicenseKey...........................................................................................................................60
DPWMSUIMethod.........................................................................................................................................................................60
DPWMSConfigurationFileMethod................................................................................................................................................62
Modules.................................................................................................................................................................63
AdminModule.................................................................................................................................................................................64
UsersTab....................................................................................................................................................................................64
AddinganewDPWMSUser...................................................................................................................................................65
DeletingauserfromtheDPWMS..........................................................................................................................................66
ActivityTab.................................................................................................................................................................................67
BackupTab..................................................................................................................................................................................67
CreateaDatabaseBackup......................................................................................................................................................68
RecoveringfromaDatabaseBackupFile...............................................................................................................................68
ErrorsTab....................................................................................................................................................................................69
UpgradesTab..............................................................................................................................................................................70
UpgradingtheDPWMS...........................................................................................................................................................70
RestartingtheDPWMSProcess..............................................................................................................................................71
PlatformTab...............................................................................................................................................................................72
DellProtectedWorkspaceHomeModule.......................................................................................................................................73
HomeTab....................................................................................................................................................................................74
ThreatDataSection................................................................................................................................................................74
ConfigurationManagementSection......................................................................................................................................75
4
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
AdministrationSection...........................................................................................................................................................76
ThreatsModule...............................................................................................................................................................................77
SettingsandPlugins....................................................................................................................................................................78
ThreatDataModuleSettings..................................................................................................................................................78
PluginSettings........................................................................................................................................................................79
OverviewTab..............................................................................................................................................................................80
DetectionsbyDate.................................................................................................................................................................80
DetectionsbyCategory..........................................................................................................................................................80
TopUsersandTopSources....................................................................................................................................................81
DetectionsTab............................................................................................................................................................................82
ThreatCategories...................................................................................................................................................................83
ReportOverviewPage................................................................................................................................................................85
Statistics.................................................................................................................................................................................85
Configuration..........................................................................................................................................................................86
Applications............................................................................................................................................................................87
ThreatReportAnalysisTab.....................................................................................................................................................88
ThreatReportEventTreeTab................................................................................................................................................89
ThreatReportTimelineTab....................................................................................................................................................91
ThreatReportGeographyTab................................................................................................................................................92
ThreatReportPluginTabs......................................................................................................................................................92
ThreatReportActions:...........................................................................................................................................................93
ConfigurationModule.....................................................................................................................................................................94
Hosts...........................................................................................................................................................................................94
Groups........................................................................................................................................................................................94
Packages.....................................................................................................................................................................................94
AccessingtheConfigurationModule..........................................................................................................................................95
ConfigurationModuleInterface.................................................................................................................................................95
PackagesTab..........................................................................................................................................................................95
AddingaPackagetotheDPWMS......................................................................................................................................96
Viewingpackagedetails.....................................................................................................................................................97
EnteringtheClientSoftwareActivationKey....................................................................................................................100
AdditionalGlobalPackageSettings..................................................................................................................................101
GroupsTab...........................................................................................................................................................................102
CreatingaNewGroup......................................................................................................................................................103
RenamingaGroup...........................................................................................................................................................103
GroupDetailsView..........................................................................................................................................................104
SetInstallationMethod....................................................................................................................................................109
AdjustPreferences...........................................................................................................................................................111
AddingCustomPreferences/Attributes.........................................................................................................................113
ManageUnprotectedSites..............................................................................................................................................115
CustomizeAppSettings...................................................................................................................................................118
HostsTab..............................................................................................................................................................................122
AuditTab..............................................................................................................................................................................127
ContactingDellSupport..............................................................................................................................129
5
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
PurposeandIntendedAudience
ThisdocumentisintendedtoprovideinstructionsforinstallingandconfiguringtheDellProtectedWorkspace
ManagementServer.ItisintendedforITadministratorsthatwillbecompletingtheinitialdeploymentandconfiguration
and/orwillbemanagingtheDellProtectedWorkspaceManagementServer.
SystemRequirements
OneofthefollowingHostPlatforms
o VMwareWorkstation7.1orlater
o VMwareESXorESXi4orlater
2GBofavailableRAMfortheVirtualMachine(forprebuilttemplate)
40GBofavailablediskfortheVirtualMachine(forprebuilttemplate)
1Networkconnection
fortheVirtualMachine
1IPaddresstoassigntothesystem
1DNSSystemNametoassigntothesystem
Externalinternetconnectivity(foractivationandOSupdates)
Compatiblewebbrowsertoaccessthesystem
o InternetExplorer9+
o GoogleChrome30+
o Mozilla
Firefox20+
IMPORTANTNOTE:TheDellProtectedWorkspaceManagementServerrequiresaninternetconnectiontoallow
activationoftheserver.
ThevirtualmachinecanalsoberuninaCitrixorMicrosoftvirtualenvironment;howeverinstallationinstructionsarenot
includedforthoseenvironments.TheprovidedVMwareimagewillalsoneedto
beconvertedtosupporttheseother
platformsbeforedeployment.Postinstallationconfigurationstepswillremainthesame.
6
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
DPWMSSizingRecommendations
ThefollowingtableoutlinestherecommendedVMconfigurationbasedonnumberofclientsthatwillconnecttothe
DPWMS:
#ofClientSystems #ofDPWMSAPI
Systems
Memorypersystem vCPUpersystem
Upto1000 1 2GB 1vCPU
10002000* 1 4GB 2vCPU
2000+ multiple 2GB 1vCPU
*Thisnumbercanbeincreasedifhear tbeatsaresettodaily,thisisbasedonanhourlyheartbeatsetting
Note:forenvironmentsthatrequiremultipleAPIservers,adedicatedMySQLVM,adedicatedDPWMSUIVManda
dedicatedloadbalancerVMareallrecommended.
Thefollowinggraphicprovidesa
basicoverviewofamultiAPIenvironment,asrecommendedforlargerinstallation
bases.
7
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
DellProtectedWorkspaceManagement ServerFeatures
TheDellProtectedWorkspaceManagementServer isamodularsystemthatallowsformultipleDellProtected
Workspaceapplicationstorunonasingleappliance.Eachmoduleislicense din dividuallyandwillonlybeavailablewith
avalidlicensekey.
ThreatsModule
TheThreatsModuleallowsDellProtectedWorkspaceclientstoviewThreatReportdetails.Themodulereceivesthe
reportsfromtheEnterpriseclientsoftwareanddispla ysthemforreviewbythesecurityanalysts.Thisfeaturesetwas
previouslyfoundintheDellProtectedWorkspaceThreatDataServer.
ConfigurationModule
TheConfigurationModuleallowsforcentralizedmanagementoftheDellProtectedWorkspaceclients,managingboth
configurationfilesandsoftwareupdates. ThisfeaturesetwaspreviouslyfoundintheDellProtectedWorkspace
ConfigurationManagementServer.
AdminModule
TheAdminModuleallowsforadministrativemanagementoftheDellProtectedWorkspaceManagementServer,
includingmanaginguseraccounts,applyingDPWMSupgrades,viewingerrorlogsandcreatingbackupsofthedatabase.
8
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
InstallingtheDellProtectedWorkspaceManagementServer
TheDellProtectedWorkspaceManagementServer isdeliveredasavirtual machine,intheVMwareOVFtemplate
format.ThefollowinginstructionsoutlinehowtoinstalltheDPWMSonei ther VMwarevSphere4.xorlaterorVMware
Workstation7.1.xorlater.Somestepsmaydifferslightlybasedontheversionbeingused.
Thefollowinginstructions
assumethatthelatestDPWMStemplatehasbeendownloadedfromtheDell.
InstallationonVMwarevSphere4.xorlater
1. OpentheVMwarevSphereClientandconnecttotheESX(i)orvCentersystemthattheDPWMSwillbeinstalled
on.
9
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
2. SelecttheFilemenuandchoose“DeployOVFTemplate…”
3. ChoosethefilelocationoftheOVFtemplate(thedownloadmustbeunzippedbeforethisstep).Pressthe
“Next”button.
10
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
4. ReviewtheOVFinformation.Pressthe“Next”button.

5. Givethevirtualmachineaname(orusethedefaultoneprovided).Choosewhichdatacenter/foldertheVMwill
bedeployedto(ifapplicab le).Pressthe“Next”button.


11
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
6. Forclusteredsystems,choosewhichcluster/hosttheVMwillbedeployedon.Pressthe“Next”button.
7. Ifmultipledatastoresareavailable,cho o sethedatastoretodeploytheVMon.Pressthe“Next”button.

12
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
8. Choosethedesireddiskformatforthevirtualdisk.Pressthe“Next”button.
9. SelectthenetworkthattheVMwillbeconnectedto.Pressthe“Next”button.

13
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
10. Verifyyourconfigurationandpressthe“Finish”button.

11. Optionalstep:OncetheOVFtemplatehasfinisheddeploying,takeasnapshotoftheVMtoretaintheoriginal
settingsbeforeanyconfigurationis done.
12. Poweron
theVM.
13. InstallationoftheDPWMSisnowcomplete.PleasecontinuetotheConfiguringtheDellProtectedWorkspace
ManagementServerforBasicOperationsection.
14
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
InstallingVMwareToolsforDPWMSrunninginavSphereEnvironment
ToinstallVMwareToolsintotheDPWMSappliance,followthesesteps.
1. ConnecttotheconsoleoftheDPWMSfromthevSphereclient.Usetherootaccount(defaultpasswordis
invincea)
2. FromtheVMmenu,selectGuest,thenInstall/UpgradeVMwareTools
3. Createamountpointforthecdromby
runningthefollowingcommand:
mkdir /mnt/cdrom
4. MounttheVMwareToolsimagebyrunningthefollowingcommand:
mount /dev/cdrom /mnt/cdrom
5. ExtractthetarfileforVMwaretoolstothe/vardirectorybyrunningthefollowingcommand:
tar zxf /mnt/cdrom/VMwareTools-X.X.X-YYYYYY.tar.gz -C /var/
NOTE: replace X.X.X-YYYYYY with the version number of the VMware Tools being
installed
6. Changetotheextracteddirectorybyrunningthefollowingcommand:
cd /var/vmware-tools-distrib/
7. Run
theVMwareToolsinstallerscriptbyrunningthefollowingcommand:
./vmware-install.pl
8. Followtheonscreenpromptsandselectthedefaultsettingforeachoption.
15
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
9. ConfirmtheinstallationwassuccessfulbyviewingthedetailsoftheVM.Astatusof“VMwareTools:Running
(Current)”shouldbedisplayed.
16
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
Upgradingthenetw orkadaptertoVMXNET3forDPWMSrunninginavSphereEnvironment
InsomeVMwareenvironments,changingtheDPWMSappliancenetworkadapterfromthedefaultE1000adaptertoa
VMXNET3adaptermayberequired.Tochangetheappliancetothehighperformancenetworkadapter,follow these
instructions.
1. ConnecttotheDPWMS ap plianceVMviathevSphereconsole.
2. FromtheVMmenu,
chooseEditSettings
3. Selectthe“NetworkAdapter1”devicefromthelistandpressthe“Remove”buttonabovethedevicelist.

17
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
4. Pressthe“Add”buttonabovethedevicelist.
5. Select“EthernetAdapter”fromthedevicelistandthenpressthe “Next”button.

18
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
6. FromtheNetworkTypewindow,selectVMXNET3astheAdapterTypeandselectthecorrectnetworkfromthe
NetworkConnectiondropdown.Alsomakesurethe“Connectatpoweron”checkboxisselected.Pressthe
“Next”
button.
7. Pressthe“Finish”button.
8. Pressthe“OK”button.
19
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
9. Fromtheconsole,loginastherootuserandrunthefollowing com mand:
rm /etc/udev/rules.d/70-persistent-net.rules
10. Confirmthedeleteprocesswhenprom pted .

20
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
11. Reboottheappliancebyrunningthefo llowing command:
reboot
12. Verifypropernetworkconnectivityafterthesystemreboot.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129

Dell Protected Workspace Owner's manual

Category
Software
Type
Owner's manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI